![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.1.1.2.2016.432 |
Category: | Debian Local Security Checks |
Title: | Debian: Security Advisory (DLA-432-1) |
Summary: | The remote host is missing an update for the Debian 'postgresql-8.4' package(s) announced via the DLA-432-1 advisory. |
Description: | Summary: The remote host is missing an update for the Debian 'postgresql-8.4' package(s) announced via the DLA-432-1 advisory. Vulnerability Insight: Several bugs were discovered in PostgreSQL, a relational database server system. The 8.4 branch is EOLed upstream, but still present in Debian squeeze. This new LTS minor version contains fixes that were applied upstream to the 9.1.20 version, backported to 8.4.22 which was the last version officially released by the PostgreSQL developers. This LTS effort for squeeze-lts is a community project sponsored by credativ GmbH. This release is the last LTS update for PostgreSQL 8.4. Users should migrate to a newer PostgreSQL at the earliest opportunity. Migration to Version 8.4.22lts6 A dump/restore is not required for those running 8.4.X. However, if you are upgrading from a version earlier than 8.4.22, see the relevant release notes. Fixes Fix infinite loops and buffer-overrun problems in regular expressions (Tom Lane) Very large character ranges in bracket expressions could cause infinite loops in some cases, and memory overwrites in other cases. (CVE-2016-0773) Perform an immediate shutdown if the postmaster.pid file is removed (Tom Lane) The postmaster now checks every minute or so that postmaster.pid is still there and still contains its own PID. If not, it performs an immediate shutdown, as though it had received SIGQUIT. The main motivation for this change is to ensure that failed buildfarm runs will get cleaned up without manual intervention, but it also serves to limit the bad effects if a DBA forcibly removes postmaster.pid and then starts a new postmaster. Affected Software/OS: 'postgresql-8.4' package(s) on Debian 6. Solution: Please install the updated package(s). CVSS Score: 5.0 CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2016-0773 BugTraq ID: 83184 http://www.securityfocus.com/bid/83184 Debian Security Information: DSA-3475 (Google Search) http://www.debian.org/security/2016/dsa-3475 Debian Security Information: DSA-3476 (Google Search) http://www.debian.org/security/2016/dsa-3476 http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177878.html http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177820.html https://security.gentoo.org/glsa/201701-33 RedHat Security Advisories: RHSA-2016:1060 http://rhn.redhat.com/errata/RHSA-2016-1060.html http://www.securitytracker.com/id/1035005 SuSE Security Announcement: SUSE-SU-2016:0539 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00052.html SuSE Security Announcement: SUSE-SU-2016:0555 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00054.html SuSE Security Announcement: SUSE-SU-2016:0677 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00016.html SuSE Security Announcement: openSUSE-SU-2016:0531 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00049.html SuSE Security Announcement: openSUSE-SU-2016:0578 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00056.html http://www.ubuntu.com/usn/USN-2894-1 |
Copyright | Copyright (C) 2023 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |